IETF attendees, please post corrections.

Status
One milestone, we're late; IETF tradition.
Using issue tracker.
Anyone implementation updates?  Nordunet and akamai still active

Ben and Eran hampered by lack of audio

RFC 6962-bit update

Threat Analysis (Steve Kent)
                Threat is a motivated capable adversary; threat analysis (see 
RFC 4949), taxonomy of actors and classes
                Threat analysis requires that security functionality or goals 
be clearly articulated
                Most don't need this, just Security Considerations, since 
they're not security protocols
                CT is a complex security system with many elements and thus 
seems to merit a threat analysis
                Why? Can help guide system designers; after design, helps users 
understand what it provides
                Current text
                                Mis-issuance is either syntax (bad profile) or 
semantic (to a wrong entity)
                                Malicious CA vs not-malicious; errors vs 
attacks; logged vs not logged; benign vs conspiring logs
                                Detailed outline of attacks
                Missing in current text
                                List of adversaries?
                                Concise statement of security goals, such as 
"the goal of CT is to deter, detect, and help mitigate certificate mis-issuance"
                Part of 6962-bis or separate doc? (No strong pref, but perhaps 
bis is long enough already)  If separate, perhaps rename to include "logs" in 
name since it doesn't talk about client behavior
                Consensus to adopt as a WG document; will go to mailing list 
for confirmation

Gossip (dkg)
                Gossip keeps logs accountable (e.g., meet MMD, not present spli 
view of tree head)
                Monitors are auditors, not all auditors are monitors
                Biggest issue is privacy considerations; relationship between 
clients and servers, but not between auditors/log and server/log - speak up if 
you disagree
                Gossip happens among various parties (see preso)
                Recommend mix in "noise" in auditor response to avoid 
disclosing browser history
                Terminology confusion: TLS client vs log client, e.g.
                Some updates to the (nice) multi-party pictures and flows 
offered
                Not enough people read it; premature to talk about adoption, 
but it got well-received in the room will raise on mailing list.

Open issues in trac (eran)
                #4 sign TBS for certs?  Consistent with precertificates, avoid 
bad encoding of sig params.  Good idea, yes.
                #10 - blinked and missed this, sorry
                #41 - handled by steven kent
                #53 - requiring logs to order entries; no, clarify it's not a 
requirement
                #55 - security considerations, no since going to define client 
behavior
                #58 - limit STH's per unit time; hard to enforce
                Client behavior - 20 tickets, slot on agenda
                #8 client privacy; significant change, but not be enough; 
postponed

Any interest in a document describing client behavior?  No enthusiasm; to be on 
list

RFC 6962-bis update
                Handled server time skew
                Added machine-readable error codes to responses (e.g., 
malformed request, invalid cert, etc)
                New API merges Get STH, get Consistency:Proof, get 
InclusionProof
                Added metadata for log parameters (including final STH for 
frozen logs); comment if anything missing
                Algorithm agility: propose to freeze log, start new one; if 
necessary, will have to include all old data in the new log.
                See Steve Kent's open issue, which pointed to an RFC for some 
ideas and more details; agree need more details on what clients should do when 
this happens






--
Senior Architect, Akamai Technologies
IM: [email protected]<mailto:[email protected]> Twitter: RichSalz

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to